Details

    • Type: Bug
    • Status: Closed (View Workflow)
    • Priority: Critical
    • Resolution: Duplicate Issue
    • Affects Version/s: 1.7.0.CR2
    • Fix Version/s: 1.8.0.Final
    • Component/s: SSL
    • Labels:

      Description

      I have compared jdk supported ciphersuites with Elytron Mechanism Database. Here are cipher suites which does not match:

      • TLS_AES_128_GCM_SHA256
      • TLS_AES_256_GCM_SHA384
      • TLS_EMPTY_RENEGOTIATION_INFO_SCSV

      Especially first two seems important as are mentioned in TLS 1.3 rfc [1]

      [1] https://tools.ietf.org/html/draft-ietf-tls-tls13-28

        Gliffy Diagrams

          Attachments

            Issue Links

              Activity

                People

                • Assignee:
                  fjuma Farah Juma
                  Reporter:
                  mchoma Martin Choma
                • Votes:
                  0 Vote for this issue
                  Watchers:
                  3 Start watching this issue

                  Dates

                  • Created:
                    Updated:
                    Resolved: